Use of Incorrectly-Resolved Name or Reference Affecting istio-pilot-discovery-1.21 package, versions <1.21.3-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.17% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-ISTIOPILOTDISCOVERY121-6809142
  • published17 Jun 2024
  • disclosed24 Aug 2021

Introduced: 24 Aug 2021

CVE-2021-39156  (opens in a new tab)
CWE-706  (opens in a new tab)

How to fix?

Upgrade Chainguard istio-pilot-discovery-1.21 to version 1.21.3-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream istio-pilot-discovery-1.21 package and not the istio-pilot-discovery-1.21 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with #fragment in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.

CVSS Scores

version 3.1